Blog

Recently back from AWS:ReInvent, I’m still processing all the data. AWS is Amazon’s Web Services. Amazon is currently hosting 3 times more cloud services than their closest competitor (Azure), making them the 800 pound gorilla of cloud computing. AWS:ReInvent is the trade event they recently held in Las Vegas. Writing a blog helps me process, so here’s my blog about the show. Thanks for helping me process.
First of all, ReInvent is huge. Content was being delivered in three different hote... read more.

Cloud First
At this time of year, we often meet with our customers and ask the question “What are your initiatives for next year?” Over the last few weeks, and really throughout 2017, we’ve been hearing a lot of cloud, cloud, cloud. The change in mentality is moving quickly. A year ago, a company may have said they have concerns around security and data, and they are going to stay where they have investment. Today’s meetings consist of our customers pushing us to figure out how they... read more.

This year was once again filled with major security breaches. In fact, these breaches have impacted so many of us that they are becoming a routine fact of life for companies and individuals alike. The Equifax breach in particular affects practically every person or entity that has had a credit check done in recent years.
Protection of our personally identifiable information (PII) and financial information should have been a priority with a credit bureau. As we've seen, it was not. And of course... read more.

Machine Learning is a broad concept covering algorithms that can receive input data and use statistical analysis to predict an output value within an acceptable range. It analyzes past data to predict future data and to provide context for the current values. In a sense, the machine has learned how this metric “behaves” and can put parameters around the current value (standard deviation, probability bands, etc.), adding knowledge that isn’t obvious if all you have is the single, current me... read more.

The tech news has been abuzz recently with stories about how machine learning is making impressive strides in areas like autonomous vehicles, face recognition, and language translation. You can now be automatically tagged in Facebook photos of events you don’t even remember attending. But, while these are impressive achievements that may enhance some of your personal experiences, they have little bearing on your business. You might be surprised to find out these are just some of the more exciting appl... read more.

Come join the murderCome fly with blackWe’ll give you freedomFrom the human track
“Come Join the Murder”, The Forest Rangers & The White Buffalo
My youngest daughter is going to college next year and is interested in engineering. We’re doing college visits so she can check out possible schools and as an engineer myself this leads to a certain amount of introspection. Engineers have many options in terms of the type of companies they work for and the type of work they do. I&rsqu... read more.

A critical weakness has been discovered in WPA2, the ubiquitous protocol that secures Wi-Fi networks worldwide. The attack known as “KRACKS” which is short for Key Reinstallation Attacks, enables attackers within range of the target Wi-Fi network to see data that is presumed to be safely encrypted. This effectively renders organizations that leverage WPA2 vulnerable to theft of critical data such as credit card numbers, passwords, emails, photos, etc. It also makes it possible for a man-in-the-m... read more.

Commercial software developers work hard to create a product that offers significant value to their customers. They know that the value they deliver in terms of hard savings, increased efficiencies, or lower risk will ultimately drive the price of their software.
Optimally, a licensing scheme should effectively capture some portion of the customer value as an equitable payment for that value delivered. I think that is only fair. If we follow this to its natural conclusion, we might conclude that the best l... read more.

Troubleshooting
Issue
AppDNA 7.13
When attempting to execute a Direct Import of an MST file, the following error messages occurs. After selecting Continue, it will return to the AppDNA console but the import will not proceed.
Solution
Changed the path of the Log File location within the AppDNA settings by selecting Configuration > Files.
I changed the Log File Location from %CommonAppData%\AppDNA\appTitude\Logs to C:\Temp.
This resolved the issue and I was able to import MST... read more.